MS08-067 check 可以批量检测 MS08-067 漏洞
更多关于 MS08-067 的利用等信息可以参看:
- MS08-067 Exploit for CN 2k/xp/2003 .net version
- MS08-067 Exploit for CN 2k/xp/2003 bypass version
- MS08-067 - MS Windows Server Service Code Execution PoC
This tool can be used to anonymously check if a target machine or a list of target machines are affected by MS08-067 (Vulnerability in Server Service Could Allow Remote Code Execution)
Usage $ python ms08-067_check.py -h Usage: ms08-067_check.py [-d] {-t |-l }
Options: —version show program’s version number and exit -h, —help show this help message and exit -d show description and exit -t TARGET target IP or hostname -l LIST text file with list of targets -s be silent
Example $ python ms08-067_check.py -t 192.168.123.30 192.168.123.30: VULNERABLE
下载地址:[ms08-067_check.py](/blog/download.asp?id=197 MD5: 67E72C148E5B3E606E4FEAAEF9436563 SHA1:5F0EF8BDBA8B58F2E2FF9F0C1B2176823A2FB92B